Next Article in Journal
V2T-GAN: Three-Level Refined Light-Weight GAN with Cascaded Guidance for Visible-to-Thermal Translation
Next Article in Special Issue
Investigating the Impact of Synchrotron THz Radiation on the Corneal Hydration Using Synchrotron THz-Far Infrared Beamline
Previous Article in Journal
Energy Consumption Model of SCHC Packet Fragmentation over Sigfox LPWAN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Application and Advances in Radiographic and Novel Technologies Used for Non-Intrusive Object Inspection

1
Information Technologies Department, Turiba University, Graudu Street 68, LV-1058 Riga, Latvia
2
Computer Engineering and Electronics Department, Kremenchuk Mykhailo Ostrohradskyi National University, Pershotravneva 20, 39600 Kremenchuk, Ukraine
3
Institute of Information Technology, Riga Technical University, Kalku Street 1, LV-1658 Riga, Latvia
4
School of Aerospace Engineering, Universidad Politécnica de Madrid, 28040 Madrid, Spain
5
FLOW, Engineering Mechanics, KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(6), 2121; https://doi.org/10.3390/s22062121
Submission received: 8 February 2022 / Revised: 5 March 2022 / Accepted: 7 March 2022 / Published: 9 March 2022

Abstract

:
Increase in trading and travelling flows has resulted in the need for non-intrusive object inspection and identification methods. Traditional techniques proved to be effective for decades; however, with the latest advances in technology, the intruder can implement more sophisticated methods to bypass inspection points control techniques. The present study provides an overview of the existing and developing techniques for non-intrusive inspection control, current research trends, and future challenges in the field. Both traditional and developing methods, techniques, and technologies were analyzed with the use of traditional and novel sensor types. Finally, it was concluded that the improvement of non-intrusive inspection experience could be gained with the additional use of novel types of sensors (such as biosensors) combined with traditional techniques (X-ray inspection).

1. Introduction

Worldwide globalization processes aim to make the world more open offering the possibility of easy access to different places around the world regardless of their citizenship or nationality. It also helps make it possible to choose places to visit, to live, and to work based on one’s own preferences without any obstacles during travelling [1,2,3,4,5,6,7,8,9]. Additionally, the modern world with its global integration and interconnection of all processes extremely depends on trading. Additionally, to make trading more effective, it is desirable to reduce trading barriers, including time-consuming bureaucratic and legal procedures at a customs control point [1].
However, this openness is often exploited by different categories of malefactors intent upon spreading illicit or dangerous goods and materials, including smuggling, weapons, narcotics, etc., around the globe. Moreover, with advances in IT, electronics, and other modern technologies, the ways and media employed by criminals to bypass legal control procedures are becoming more and more sophisticated.
After the EU migration crisis in 2015, several states from the Schengen group temporarily restored control at their national borders [3,4,5,6,7,8]. However, this created additional obstacles for travelers and trading companies, and could not be considered as an effective countermeasure for economic reasons [3,4,5,6,7,8]. Thus, different approaches to increasing national security, along with improvement of border control experience both for travelers and trading companies, providing comprehensive but expeditious non-intrusive inspection, should be applied.
In order to counter these constantly growing threats, governmental and intergovernmental organizations establish specialized agencies, implement novel automated inspection technologies at customs and other control points, and issue improved instructions for non-intrusive inspection mechanisms. However, big international criminal organizations still remain ahead of security control establishments with the use of both legitimate and illegitimate supply chains exploiting more advanced technology and instruments in bypassing the inspection process. So, the question remains, whether the currently existent inspection mechanism provides an adequate level of security and protection for the society and effectively helps to reduce the illegal trade level. Thus, there is still a need for cooperation and information exchange between different branches of the security control process, as well as a strong demand for the development of novel techniques and technologies for check point inspection control.
Over the last few decades, governments in different parts of the world have been introducing novel instruments in inspection, particularly, in border control management. For example, a European Border and Coast Control Agency, known as Frontex was established within the European Union’s Schengen Area with the aim of coordinating border control efforts at the external borders of the European Union [10]. The USA constantly improves protection on the border control points with Mexico, where they have a constant issue with illegal migration and smuggling [11]. Similar challenges are being faced in other parts of the world, such as Oceania, Asia, Africa, and South America [11]. In each area, governments are taking measures, which could be different in nature and dependent on typical regional peculiarities, such as continuous integration of EU member countries in Europe, geographical challenges in Oceania and North America, and historical challenges in Africa and South America [11].
These novel techniques for improvement of border control experience for legitimate travelers typically relate to person identification technologies based on behavioral or physical characteristics and include automated methods to recognize fingerprints, hand and finger geometry, retinal and iris scanning, voice and facial recognition [12,13]. As an example, over the last 15 years SmartGate, ePassport, and eVisitor technologies are being successfully implemented and exploited in Australia [14]. Working together, these technologies using information from the traveler’s biometric passport (such as name, date of birth, and photograph), using facial recognition technologies and information from the national database (such as banned travelers database) to automatically verify a person’s identity and make a decision on whether to grant entry to the country, or allow the person to depart, or send the person to a customs official for additional manual inspection. Similarly, the USA established US-VISIT Program (US Visitor and Immigrant Status Indicator Technology) [15], which provides border control points with biometric technology helping to verify the visiting person’s identity based on facial and fingerprint recognition techniques as well as using verification through available databases.
Bad experiences with the implementation of such technologies should also be mentioned. Thus, in 2007, the UK brought in an e-Border project, aimed to collect and store information on passengers and crew entering and leaving the country [16]. However, in 2014 the project was terminated due to constant delays in its implementation [16]. This example allows us to testify that the problem of border control automation and improvement security throughout the control points remains complex and requires improvement in the approaches considered to its solution, involving close cooperation of different types of organizations and institutions, including legislative, governmental, intergovernmental, and technical ones as well.
Thus, the evolution of security control at national borders has resulted in an increasing number of border control types, the amount of data to be controlled, and the number of technologies used to provide all these types of control [11]. Multiplication in technologies used for border control results in the implementation of novel sensors, hardware, and software, as well as data analysis systems for surveillance, identification, data storage, and analysis.
Surveillance technologies have constantly evolved during the past 20–30 years. They include X-ray screening techniques for non-intrusive inspection of baggage, personal belongings, cargo, etc., non-intrusive body inspection techniques, air analysis techniques to detect explosives, narcotics, people that might be hidden in cargo, and other illicit goods [12,13].
One of the most important challenges in non-intrusive inspection is the dataflow between different systems and different governments. Over the past 20 years, several integrated data systems which are still regularly enhanced, have been introduced in Europe.
The most widely known in Europe are the following:
  • The Schengen Information System (SIS). This system takes its roots from 2001, and currently coordinates the databases of 26 countries. Technically, SIS is based on classic star data processing architecture, with the reference database located in the French Republic, while all other states have a copy of this database. SIS stores data on persons that are refused entry; suspected of a crime; data referred to lost or stolen weapons, motor vehicles, identity documents, etc. France manages the SIS reference database and is responsible for its constant update every five minutes [17].
  • Eurodac. European Asylum Dactyloscopy Database (Eurodac) is a database that includes fingerprints of asylum seekers and irregular border crossers [18]. This database is used by 27 EU Member States and Associated Countries and is aimed at controlling both the legal and illegal movement of asylum seekers within Eurodac countries.
  • The Visa Information System (VIS). This database contains information required from visa applicants wishing to enter Schengen Area countries, including biometric data, such as fingerprint and facial images. Similar systems are implemented in other parts of the globe, namely, in the USA it is known as the Arrival and Departure Information System (ADIS) [19], SmartGate in Australia, and others [20].
These examples demonstrate the possibility of deep integration of the information systems across different states and combining them into a united database available to each participating state or organization. All these examples mostly relate to person identification issues; however, the question of items identification, development of similar databases containing data on legal and illegal items, remains open. Additionally, the problem of a comprehensive non-intrusive inspection at control checkpoints which provides fast and highly reliable results with detection of the most typical threat types, and does not significantly delay people and cargo flows, still needs deeper improvement. The following chapters reveal traditional and developing techniques, which could be enhanced for the aims of non-intrusive object inspection.

2. Technology Used for X-ray Screening

The most popular technique, currently used at almost every airport and several control points for quick non-intrusive inspection, is X-ray screening. There are several different X-ray scanning techniques, which differ by their complexity, cost, and results provided. Currently, two main groups of X-ray machines based on either single- or dual-energy analysis, are most widely used [21,22,23]. Simple single-energy machines provide black-and-white 2D images, representing the “shadow” of an inspected object generated by direct X-rays penetration through it. These images could provide general information about the object’s shape and density, but information about the object’s depth and structure remain unknown; thus, additional image processing techniques need to be applied for the subsequent processing of the retrieved raw information.
Dual-energy machines generate high- and low-energy X-ray beams as a result of a Compton effect and use the scattered radiation analysis to determine atomic numbers of the inspected object. These atomic numbers are subsequently used for object material determination, helping to recognize and classify objects both by their shape and composition.
Recently, a number of more advanced techniques have appeared, but all of them use the basic principles of X-ray inspection and are described below.

2.1. Planar Radiography

One of the most popular and widely used solutions for X-ray inspection is based on the planar radiography principle. Within this technology, single-energy X-ray machines are used to generate X-radiation beams that penetrate inspected objects. Different types of materials, depending on their density, absorb different percentages of X-ray radiation, which results in a different shade of gray on the resulting image: material with a high-density structure, such as bones and metals, absorb a higher percentage of radiation and appear lighter in the resulting image, while low-density materials could absorb nothing, and appear black in the resulting picture (e.g., air). To record an image, the receptor is placed opposite to the X-ray source, and the inspected object appears between the source and detector.
The typical schematic of a standard planar radiography setup is presented in Figure 1.
A typical challenge in planar radiography is the superposition of compositional variations within the object under inspection. To solve this issue, several methods for determination of the object’s depth were developed. One such method proposes to use the rotation of the coordinates to obtain additional features which could be used to determine the depth of the object. This approach assumes the creation of two orthogonal images from frontal and lateral views.
Another approach proposes the creation of two images displaced by a few degrees, which could be then viewed in a stereoscope to get a full picture of an object under inspection (Figure 2). With this technique, it should be considered that while focus and detector move, the images of all points in a plane under consideration should be in the same set of points within the detector plane.
Planar radiography systems could mainly provide information about the object’s shape. However, it is not easy to obtain quantitative information about the object’s density due to the presence of interfering materials within the object under inspection (e.g., bag or package).

2.2. X-ray Computed Tomography (CT)

Another special radiographic technique is tomography. This technique was introduced with the aim of overcoming the overlapping issue by rotating coordinates, where the image detector and the X-ray tube continuously move in opposite directions over a limited range [24]. Only the elements in the plane containing the fulcrum remain stationary in this technique, while the smoothness of movement blurs out the image of other object components outside the fixed layer. The movement angle and required resolution form the thickness of the section in focus within this method.
With advances in digital computer performance, it became possible to employ them, in combination with counters based on ionization or scintillation principles, to X-ray radiography tasks. This allowed imaging environments with a low atomic number, such as soft tissues, which ignited a novel era in clinical diagnostics, and later in material control and detection techniques.
Within this technique, a narrow X-radiation beam from a rotating pencil passes through the object under inspection, and then through a carefully aligned collimator to be received by a detector array (Figure 3). Such a technique allows one to overcome the problem of overlapping and provides the possibility of detecting variations in the linear attenuation coefficients for low-nuclear media as low as 0.05% [24]. This capability is due to the possibility of electronically spreading the range of numbers corresponding to the typical attenuations for different media along a beam direction (also called windowing). The detector’s output then connects to a fast computer which provides the final image representation. Such an approach allows one to obtain a comprehensively inspected object representation, including its shape and depth, solving superposition issues. Such technology, for example, proves to be effectively used for the detection of some types of explosives during border control inspection [25].

2.3. Dual- and Multi-Energy Imaging

As mentioned in [25], CT scanners used for explosives detection at the border control points are closely similar to medical CT scanners based on single- and dual-energy multi-slicing. Such an approach allows one to eliminate mechanical rotation of a gantry and simplify the construction of a CT machine. Additionally, this research suggested reducing the number of views needed for successful material and shape recognition, which reduces device cost while retaining the possibility of providing reliable detection of both shape and density of an object, which, in its turn, are important features for the detection of harmless and threatening material.
Dual-energy X-ray machines use twice the amount of detecting modules compared to single-energy ones, as they need to sense both high- and low-energy X-rays [26]. Based on signals from both detector types, the system could compute atomic numbers of the inspected materials for the following determination (mostly, materials could be classified as organic, non-organic, and mixtures). In modern systems, detector arrays are installed inside protected L-shaped panels placed diagonally from the X-ray beam generator. Such construction allows one to reduce physical dimensions of the systems along with the exclusion of “blind” zones, and provide the possibility of scanning an entire section of the machine tunnel screening every single part of the inspected object (Figure 4). X-ray sensors provide weak current signals, which, with the use of Analogue-Digital Converters (ADC) are converted into digital signals and are sent to the computing device. Computing software then processes the information from sensors, creating and analyzing an image with subsequent material classification based on corrected low- and high-energy signals. Additionally, the software may colorize an image with dedicated colors for each detected material type.
Multi-energy CT (Figure 5) uses attenuation features of more than two energies within narrow energy ranges; thus, it could provide more physical features of the inspected object and make the inspection more precise and comprehensive [27,28,29]. However, this technique is more expensive as it requires more complex hardware and software for its implementation.

2.4. Backscatter Techniques

In backscatter technology, Compton backscattering effect features are used to build up an inspected object image. In contrast to traditional X-ray techniques which detect the radiation of X-ray passed through the object under study, this technique relies on the detection of the radiation reflected from the object to form an image (Figure 6) [30,31]. The received image shows materials with lower density in a light grey or white color (human skin), while showing higher density materials in a dark grey or black color (firearms). Backscatter X-ray scanners create a 2D image of an object. This technique was successfully employed to search organic materials, such as drugs, explosives, and ceramic weapons.

2.5. X-ray Diffraction Imaging

X-ray diffraction (XRD) analysis is a technique used for determining the atomic and molecular structure of a material [32]. This idea implies that the object under study is irradiated with incident X-rays followed by the measurement of scattering angles and the intensity of the X-rays scattered by the material. The molecular structure of the material could be determined by the analysis of such scattered X-ray parameters as their angles, peak positions, and intensity. This technique initially has proved to be effective in liquid medium detection and was later employed for the identification of solid-state explosive materials and drugs in non-intrusive screening machines. However, this approach is currently limited to the identification of organic explosives, and issues concerning the detection of liquid explosives remain open [32].
The analysis of results of current X-ray screening methods and techniques are summarized in Table 1.

2.6. X-ray Technology Implementation Use-Cases

All the presented X-ray machine types and principles of X-ray image processing are currently used at different types of control points, starting from airport hand luggage and cargo scanners, ending with postal screening and personal human inspection during public events. Additionally, there are several types of research related to the improvement of the result received with X-ray scanning via modifications in sensor or systems hardware, or raw data processing algorithms. Typical use cases are listed below.
As proposed in [33], a simulation model was constructed using the Monte-Carlo principle for cargo inspection. This model includes a dual-energy source with energy discriminating detectors, which electronically splits pulse flow from detector outputs. Such an approach is a possible alternative to the employment of physical filters (such as lead or copper) for splitting pulse flow. This method allows one to identify such media as tissue-equivalent plastic, silver, aluminum, and iron.
Rapiscan Systems created a screening setup to detect nuclear material in cargo containers [34]. This setup provides two-level screening. The first level, primary screening, uses fast screening based on images received from two independent detector arrays: traditional, primary, detector array, with high spatial resolution, and “rough” energy resolution array. These two detector arrays are used to identify objects with high atomic numbers, such as lead, tungsten, and uranium, which could be used as potential shielding or specialized nuclear materials. The second level is used to recheck container areas with a high atomic number, labeled as suspicious during the first level screening. Secondary screening employs X-ray beams to detect neutron or gamma radiation that could be emitted by the material in the suspicious high atomic number range.
The CT system described in [35] is used for the detection of smuggling in aviation cargo. This system uses multi-axis X-ray screening for fast detection of suspicious cargo. The screening speed is 0.2 m per second, and the time to build a 2-axis image of the full container is up to 40 s.
Ref. [36] proposes the use of the CT system for automatic inspection of the internal structure of complex objects using multiple radioscopies of inspected objects along with various directions and the use of neural network algorithms for data processing. Experimental results for 1000 objects showed less than 4.5% of faulty recognized items.
Authors in [37] have developed a linear electron accelerator to be used as an ionizing radiation source for the customs screening system used for bulky cargo inspection. This device uses a set of collimators at the output of the accelerating device which produces a harp beam of X-rays in a vertical plane. This device allows one to discriminate objects based on organic/non-organic criteria using the dual-energy method.
The experimental results of the practical implementation of a screening CT system for cargo container screening with the aim of detecting special nuclear materials is presented in [38]. The system contains two sets of detector arrays containing 128 detecting elements each, located in parallel and close to one another. The screening speed is 45 cm per second. This CT system has a complex structure which is described in detail in [34]. The experiments showed that the radiation image unevenness of the inspected object significantly influences the different thread detection, which could be explained by the heterogeneity of the object structure.
A novel algorithm for material recognition to be used in baggage control points at the airports and other checkpoints was developed in [39]. This algorithm is based on dual-energy analysis combined with spectral analysis of digital radiation images of the objects under inspection. Experimental results showed the effectiveness of the proposed algorithm to detect metallic, organic, and mixed composition materials with acceptable accuracy and could be used as an operating method.
To assist human operators in the detection of dangerous items hidden in passenger luggage, ref. [40] proposes the automatic items detection and classification based on a combination of multi-view schematic (to obtain X-ray image projections from different angles) and the dual-energy method. This approach was successfully verified experimentally to detect fire guns in hand luggage.
To increase accuracy in the automatic detection of nuclear and explosive materials (e.g., in a seaport container) it was proposed to use three harp-shaped dual-energy X-ray beams [41]. A separate radiation source and set of detector arrays are used to form and detect radiation from every single beam, while central rays from two out of three beams are mutually orthogonal. Athos claims the improvement in operation and reliability of a screening system using such approach.
Different types of CT system construction were proposed in [42], which could be applied for screening cargo containers in variable range sizes, ensuring high inspection efficiency along with acceptable screening speed. In particular, one of the solutions uses multiple screening of the object from different angles.
A general conception of CT system operation for hidden threat detection in aircraft screening was proposed in [43]. These systems typically use backscattering techniques along with the use of gamma rays and neutrons to detect nuclear or radioactive materials.
In [44], the screening CT designed to identify material composition based on its atomic number was described. The system includes at least one X-ray source and detector array operating in spectrometric mode to record the amount of radiation passed through the object under inspection. Along with this equipment, the system could include numerous collimated detectors, which could also operate in spectrometric mode, used to detect backscattering radiation.
The dual-energy system, described in [45] and used in the CT system for personal inspection, uses combined detector arrays, where each detector contains both low- and high-energy detecting elements. As a result of computer processing, the atomic numbers, corresponding to different elements of the object under inspection, are computed. This allows one to discriminate organics, non-organics, and compounds, such as drugs, explosives, and weapons. Additionally, it proposed a novel approach to image processing, which allows one to analyze and collect only body part images with significant differences between detected and normal atomic number values typical for human tissue. This makes the image more convenient for visual inspection, and the screening process is faster and more efficient. Authors claim that such innovation could be widely implemented at airports, custom control points, international bus stations, state administrative buildings, and all the places where non-intrusive and fast screening is needed.
The CT-system for personal inspection in [46] is a dual-energy system with two parallel adjacent detector arrays used for X-ray detection in low- and high-energy zones, respectively.
In [47], a CT system with the use of a high-energy X-ray source used to detect fissile material was described.
Another screening CT based on a multi-view scheme with the use of several X-ray sources for simultaneous screening with several X-ray beams is described in [48].
One of the approaches to enhance the quality of material determination with the use of CT is based on the combination of the dual-energy method with the mathematical simulation of adjacent layers of the object under inspection [49].
In order to accelerate the detection of foreign materials in the object under inspection, it was proposed in [50] to scan objects simultaneously in two directions using two pairs of X-ray sources and detectors, while the sources could operate in a multi-energy mode (maximum radiation energy could change).

3. Technology Used for Results Analysis

Another important challenge in non-intrusive object inspection is the recognition of an object pattern and its classification aimed at differentiating legal, illicit, and dangerous objects. The most commonly used techniques in this field are related to machine learning (ML) ideas. According to its definition, machine learning is the study of computer algorithms that can improve automatically through experience and by the use of data [51,52]. In other words, ML could be described as the capability of a computer to learn how to solve a particular task without being explicitly programed with the use of a comprehensive solution algorithm. Traditionally, ML approaches are divided into three major categories, however, they could be extended:
(1)
Supervised learning;
(2)
Unsupervised learning;
(3)
Reinforcement learning.
In supervised learning, a computer is fed with the set of labeled inputs in couples with their desired outputs (labels), given by a “teacher”, and the aim is to teach the computer the general rule for mapping inputs to outputs. After completing the training process, the derived mapping function or model will be later used to predict the output for new input data.
In unsupervised learning, the learning algorithms are fed with inputs that have no labels, so the algorithm is supposed to find the structure in the inputs on its own. An algorithm takes a set of input data trying to find correlations and structures in them such as grouping, clustering, or datapoints. So, these algorithms are not capable of responding to feedback, but identifying any commonalities in the input data instead, and detecting the presence or absence of these commonalities in any new piece of input data [53].
The intercategory approach, which uses both features of supervised and unsupervised learning, and is called a semi-supervised learning approach should also be mentioned. This approach uses a small amount of labeled data along with a number of unlabeled ones, which helps to significantly improve learning accuracy. Such a technique is typically used when it is not possible to obtain the necessary amount of training data for supervised learning, or the training labels are noisy, incomplete, or inaccurate.
Reinforcement learning algorithms that learn from experience, typically use the Markov decision process (MDP) to determine the future behavior of the system aimed at maximizing the performance of the specific task. This approach is mainly used in autonomous vehicles or for playing computer games with a human opponent where there is a necessity to dynamically predict system behavior based on experience.
To improve the learning experience, dimensionality reduction is widely used. This process aims to reduce the number of random variables under analysis by singling out only principal variables. Such an approach allows one to reduce the dimension of the features set, for example, by reducing high dimensional data to a smaller space (e.g., 3D to 2D), while keeping principal variables in the model [54,55,56,57]. With the help of machine learning tools, this approach could be implemented for developing data-driven models used for data classification based on processed X-ray images [58]. In particular, recent advances in autoencoder-based order reduction [59] are extremely promising in this context.
During the last decade, methods used to solve this task have significantly improved with the implementation of AI-based devices or techniques. The most common approach to items classification includes AI-training techniques with the subsequent implementation of pattern recognition and classification algorithms. All these techniques are successfully implemented in different parts of non-intrusive screening technology: for image recognition based on derived images from different types of X-ray machines; for other patterns recognition, such as air analysis to detect explosives and narcotic particles, and image analysis used in underwater object inspection.

3.1. Pattern Recognition

Pattern recognition is the process of automatic identification of individual patterns and regularities in data using machine learning (ML) algorithms [60]. Pattern recognition systems are capable of recognizing and classifying both familiar and unfamiliar objects, their shapes from different angles even if they are partially obscured or blurred. Using acquired data, this technique is also capable of providing the classification of identified patterns. In the case of supervised training, specially prepared or simulated labeled data are used for teaching the system to recognize the object of interest. In the case of unsupervised training, the system learns to detect similarities in unlabeled data structures [61]. The most popular tools used for pattern recognition include artificial neural networks [62,63,64], support vector machines [65,66], principal component analysis [67,68], multiple linear regression [69], generalized least square regression [70,71], linear discriminant, discriminant function, and stepwise discriminant analysis [71,72,73].

3.2. Support Vector Machines (SVM)

SVMs (also referred to as support-vector networks) represent themselves as supervised learning models, which could be implemented for classification as well as for regression analysis problems [74,75]. With this technique, a model is fed with a set of labeled input data, each one belonging to one or two specified categories. SVM training algorithm creates a model which maps training data samples to the point in a hyperspace aiming to maximize the gap between two different categories. Thus, to get the best fitting hyperspace for a certain category, the algorithm maximizes the distance between the closest points from different data classes, which are defined as support vectors. Such an approach allows one to categorize new input data as non-probabilistic input classifiers [75]. This technique is widely implemented in image classification and segmentation problems, demonstrating significantly higher accuracy compared to traditional query refinement schemes [76], in biological and other sciences to classify different objects, chemicals, and media. In particular, they are successfully used for odor recognition in EN [77,78,79,80].

3.3. Artificial Neural Networks (ANNs)

ANNs are computational frameworks based on the principles of biological neural networks operation inspired by animal brain functioning. ANN is a network of simple elements, called neurons, which takes information from their inputs, changes their inner state based on input (excitation), and produces output depending on input and excitation. The network is formed by interconnecting neuron output to other neuron inputs, resulting in the formation of an oriented weighted graph [81]. The typical structure of ANN is presented in Figure 7. Typically, ANNs have a layered structure, where different layers are responsible for different types of input conversion. Typically, ANN contains an input layer, which directly interacts with the external environment and is activated by consuming feeding information from its neuron inputs; then several hidden layers, which depend on the ANN architecture, and the outer layer, also directly interact with the external environment providing processed information from its neuron outputs [82]. Due to the capability of changing its internal structure depending on the changing external environment, along with provisioning output information dependent on the dynamically changing environment, ANN proved to be a good solution for the machine learning (ML) concept. Currently, they are widely implemented for classification problems, including image and sequence recognition, decision making, which is actively used in X-ray screening machines, as well as in EN applications [83]. However, the use of ANN assumes understanding peculiarities and differences in their architecture, including the ANN model itself, as well as teaching algorithm, and network robustness, which requires a large volume of datasets during the training process.

3.4. Deep Learning

Deep learning, also referred to as deep structured learning, is a branch of machine learning, which is based on a set of algorithms aiming to simulate higher level abstraction in datasets, implementing depth graphs with several processing layers built up with several linear or non-linear transformations. Deep learning architectures include recurrent neural networks [84], convolutional neural networks [85,86,87], deep belief networks, and others [88], including more sophisticated approaches such as generative adversarial networks (GANs) which can be effectively used to improve the resolution of the obtained images [89]. They could be applied to such fields, as drug design and recognition, bioinformatics, computer visioning, image recognition, and analysis [90,91,92,93], facial analysis [94,95,96,97,98], etc. Thus, it could be exploited for non-intrusive object inspection both in image recognition, classification, and analysis tasks [99,100,101,102], and in odor recognition techniques used for drug and explosives detection. The most typical technique used in deep learning for recognition and classification tasks usually employs convolutional neural networks as they provide automated feature extraction and selection, thus there is no need for preliminary preprocessing of input data [103]. As for recent applications, solutions capable of providing liquids and gas classification and identification should be mentioned [103,104,105], which could be also exploited for narcotics and explosives detection based on odor analysis.
Thus, it is concluded that nowadays techniques for automatic threat detection during non-intrusive object inspection are actively developing. Industrial security system manufacturers currently use several highly efficient techniques, but they are unavailable for mass use. On the other hand, there are attempts to develop inspection-aid systems, which implies cloud databases including a broad number of detected threats and illicit goods patterns, which could be used by different inspection organizations independently on the type of X-ray screening equipment.
However, such systems are trained only using visual and partially structural object recognition approaches, which do not always provide reliable results, especially during illegal object detection. Thus, it is necessary to employ additional techniques when there are doubts regarding the legitimacy of inspected objects to inspect as accurately, fast, reliable, and non-intrusively as possible. The pros and cons of the most used analysis methods are presented in Table 2.

4. Novel Approaches

While X-ray inspection currently is the most widely used non-intrusive technique, and it provides information about the shape and material of hidden objects, it still has limitations regarding detection and classification of a wide range of illicit and dangerous item types. Thus, a deeper inspection with the use of additional techniques might be needed, which could involve the use of specialized laboratory equipment or complex and expensive techniques which could not be easily accessible on sight at most of the control points, or even the need of manual inspection. This could entail non-desirable delays at the control points, which could be inconvenient for citizens and critical for businesses dependent on a huge trading flow. Thus, novel approaches for non-intrusive inspection, aimed at improving screening quality and speed, currently are under deep research and consideration.

4.1. Electronic Nose

One of the possible solutions is to employ knowledge gained from nature observation. Thus, it is commonly known, that for additional inspection specially trained bio-organisms, such as sniffer dogs, insects, or other sensitive animals, could be employed to detect certain materials, objects of phenomena (such as drugs, explosives, suspects, etc.) [106]. These methods have been proven to be highly effective; however, they are relatively slow, and bio-organisms are not able to perform their duties for a long period without rest. Typically, sniffing dogs could work for about one hour, and then they need to be rested [106]. Latest advances in microelectronics and informational technologies, along with deep cooperation between IT and biology specialists, have led to attempts to develop and deploy novel sensor types aimed at mimicking bio-organism sensing. This research could be divided into two big groups: the first group relies on the use of entirely technical sensors, and the second group uses so-called biosensors. Technical sensors are those which are made of only technical components, while biosensors include integrated biological elements. Technical sensors, in turn, could be divided into two groups: electronic noses, which contain various chemical sensors aimed at converting the detected chemicals into an analytic signal, and sensors based on instrumental analytics, such as mass gas chromatography, ion mobility spectrometry, etc. Biosensors contain bio-receptors (natural elements) that could use cells, proteins, cell tissue, or nanovesicles of real biological organisms [107]. The work is based on the detection of a biochemical reaction caused by contact with a measured substance and bioreceptor.
Refs. [107,108,109] analyze the possibility of employing electronic noses for solving real-life tasks, including a non-intrusive hidden object search aimed at detecting drugs and explosives based on air chemical analysis near the inspected object. Ref. [110] presents research results on the possibility of using electronic noses to detect explosive substances such as trinitrotoluene, cyclotrimethylenetrinitramine, and pentaerythritol tetranitrate by analysis of the relative concentration of these substances in the air.
A typical odor recognition process with the use of sensors could be represented as shown in Figure 8.
An odor sample is collected by a technical device or biosensor. Next, with the use of AI data analysis techniques (typically, CNN), the collected sample is analyzed detecting the most significant features for consequent analysis. Next, the prepared data are classified aiming to single out target patterns, such as drugs, explosives, etc. In case a suspected pattern is detected the systems produce an alarm signal.
As this technique is relatively novel, deep research is currently being carried out to improve the reliability and operability of these methods for practical implementation.

4.2. Mimicking Animal Sense Receptors

It is well known that the best ideas implemented in the most efficient technical products frequently were inspired by an observation of nature. It is well known that different animals have various ranges of specialized sensing organs dedicated to helping them in solving their everyday tasks crucial for surviving. Thus, bats employ echolocation to navigate and search for their prey. Mosquitos, bed bugs, and vampire bats can see a portion of ultrared vision and so on. Such abilities are observed by the bio-scientists and later adopted by engineering scientists in a piece of equipment for different possible purposes. Recently, several publications appeared related to adopting features of crocodile multisensory skin for different purposes [111,112], as their skin could sense mechanical, thermal, and chemical substances. These abilities were exploited by technical scientists to develop novel types of sensors that are able to more effectively and rapidly detect different features in objects under inspection [113]. One of the possible solutions is based on pressure and chemical analysis within the crocodile-inspired sensors, distinguishing hidden explosives.

4.3. Other Techniques

There is a number of other promising techniques for non-intrusive inspection based on spectroscopy, which are not widely used at the moment due to limitations in their construction, type of material which could be detected, high cost, or lack of experimental verification. Some of these methods are mentioned below.
The use of ultrasonic sensors to detect media inside tanks was proposed in [114]. This method was successfully tested to detect several types of explosive liquids and is currently under deeper research to widen the range of materials which could be detected.
A series of experiments were provided in [115] aiming to verify the effectiveness of the implementation of ultraviolet photovoltaic spectrography principle to detect certain type of explosives, such as TNT (2,4,6—trinitrotoulen), PETN (pentaerythritol), and AN (ammonium nitrate).
Another research proposed pharmaceutical material detection techniques through packaging with the use of spatially offset Raman spectroscopy [116]. This method could be implemented for drugs recognition, and the developed device could be portable.
Brief analysis showed that spectrography-based methods and techniques for non-intrusive inspection could be used as an auxiliary method to detect explosive substances or drugs.

5. Conclusions

In this review, we have presented and evaluated the most recent advances in non-intrusive inspection techniques, starting from human identity verification and ending with non-intrusive object inspection with the use of novel technologies, such as biosensors. The importance of improvement of the non-intrusive person and object inspection techniques is conditioned by increased human and trade flows, which could be used by intruders, smugglers, or even terrorists for moving illicit items or persons around the globe. Along with this, it was pointed out that it is highly desirable to improve the travelling experience for legitimate passengers, speeding up inspection processes at the control points.
To counter illicit person movements, different techniques for automated identity verification are provided in different states over the globe. Most of these techniques employ machine learning and other artificial intelligence techniques for facial recognition, and subsequent searches in worldwide interconnected databases using a person’s biological data. Such an approach assumes the deep interconnection of informational systems around the globe or at least around a certain area of the globe, which needs close cooperation among different state organizations from many countries. However, such complex systems could provide very fast identity verification (from several seconds up to several minutes), enhancing the travelling experience of legitimate passengers, while detecting illegal ones with a desirable tolerance level.
Another important issue is non-intrusive baggage or cargo inspection. In the paper, the most popular techniques that are currently being implemented and developed for this task, are reviewed. Nowadays, the most widely used techniques are those based on X-ray inspection. This group of techniques could provide detailed information on the shape and dimensions of the hidden object, and in some cases could be used for the determination of its material composition to detect organics, non-organics, and liquids. A detailed analysis of X-ray systems was provided, classifying their typical construction principle and the essence of their operation. It was pointed out, that even though X-ray systems with the ability to determine the material composition of an object, provide a wider range of object features, they are more expensive, and it is not economically reasonable to use them at every control point. Thus, the need to develop novel techniques and approaches was highlighted.
The most used techniques for X-ray machine results interpretation were analyzed. It was pointed out, that the most promising currently used approaches are those based on the use of the latest advances in computational technologies, mostly, the use of artificial intelligence techniques for recognition and classification tasks. The most widely used and promising AI techniques used in non-intrusive control were reviewed, focusing on novel promising techniques aimed at providing additional information or improving the operational and computational performance of existing ones.
Finally, novel approaches to non-intrusive inspection were analyzed. The most promising, from our point of view, are those which focused on the implementation of ideas observed from nature. Thus, a range of novel sensors based on animal sensing principles have appeared during the last few years. The most deeply investigated methods currently are those that use the principles of an animal smell sense to analyze odor composition. There are different approaches in such sensor construction: one group uses an entirely technical solution, while another group is focused on the use of natural elements (biosensors) to detect the media. The experimental results of the use of such types of sensors for odor recognition, proved their efficacy in detecting some types of explosive materials as well as drug types. Thus, the implementation of these solutions could be considered in the additional non-intrusive inspection process, for example, instead of sniffer dogs.
The review provided showed that even though existing techniques were successfully used to detect a wide range of threats during the inspection, there are still incidents of illicit trading, smuggling, and terrorism, as intruders also use the latest advances in techniques and digital technologies to bypass control points. Thus, there is strong demand for improving non-intrusive inspection techniques, which could be carried out with the use of novel sensor types, such as biosensors or animal-mimicking sensors. Furthermore, we argue that deploying interpretable deep learning methods [117] can significantly improve the performance of these applications.

Author Contributions

Conceptualization, D.M., J.P., S.L.C. and R.V.; methodology, D.M., J.P., S.L.C. and R.V.; formal analysis, D.M., J.P., S.L.C. and R.V.; investigation, D.M., J.P., S.L.C. and R.V.; resources, D.M., J.P., S.L.C. and R.V.; data curation, D.M., J.P., S.L.C. and R.V.; writing—original draft preparation, D.M.; writing—review and editing, J.P., S.L.C. and R.V.; visualization, D.M.; supervision, D.M. and J.P.; project administration, D.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

SLC acknowledges the grant PID2020-114173RB-I00 funded by MCIN/AEI/10.13039/50110001103.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Polner, M. Customs and Illegal Trade: Old Game–New Rules. J. Borderl. Stud. 2015, 30, 329–344. [Google Scholar] [CrossRef]
  2. Baird, T. Functional Actorness? Border Security in the EU and Turkey. Int. J. Public Adm. 2015, 38, 849–859. [Google Scholar] [CrossRef]
  3. Bevir, M.; Phillips, R. Genealogies of European governance. Comp. Eur. Politics 2017, 15, 685–704. [Google Scholar] [CrossRef] [Green Version]
  4. Borzel, T.A.; Risse, T. From the Euro to the Schengen Crises: European Integration Theories, Politicization, and Identity Politics. J. Eur. Public Policy 2018, 25, 83–108. [Google Scholar] [CrossRef]
  5. Ceccorulli, M. Back to Schengen: The Collective Securitisation of the EU Free-Border Area. West Eur. Politics 2019, 42, 302–322. [Google Scholar] [CrossRef]
  6. Thorleifsson, C. Disposable Strangers: Far-Right Securitisation of Forced Migration in Hungary. Soc. Anthropol. 2017, 25, 318–334. [Google Scholar] [CrossRef]
  7. Trauner, F.; Ripoll Servent, A. The Communitarization of the Area of Freedom, Security and Justice: Why Institutional Change Does Not Translate into Policy Change. JCMS J. Common Mark. Stud. 2016, 54, 1417–1432. [Google Scholar] [CrossRef] [Green Version]
  8. Vollmer, B.A. A Hermeneutical Approach to European Bordering. J. Contemp. Eur. Stud. 2017, 25, 1–15. [Google Scholar] [CrossRef]
  9. Williams, J.M. The Safety/Security Nexus and the Humanitarianisation of Border Enforcement. Geogr. J. 2016, 182, 27–37. [Google Scholar] [CrossRef]
  10. Frontex. Available online: https://frontex.europa.eu (accessed on 4 February 2022).
  11. Tholen, B. The Changing Border: Developments and Risks in Border Control Management of Western Countries. Int. Rev. Adm. Sci. 2010, 76, 259–278. [Google Scholar] [CrossRef]
  12. Broeders, D. The New Digital Borders of Europe: EU Databases and the Surveillance of Irregular Migrants. Int. Sociol. 2007, 22, 71–92. [Google Scholar] [CrossRef]
  13. Cornelius, W.A. Death at the Border: Efficacy and Unintended Consequences of US Immigration Control Policy. Popul. Dev. Rev. 2001, 27, 661–685. [Google Scholar] [CrossRef] [Green Version]
  14. SmartGate. Available online: https://www.abf.gov.au/entering-and-leaving-australia/smartgates (accessed on 4 February 2022).
  15. US-VISIT. Available online: https://ois.usc.edu/students/travel/usvisit/ (accessed on 4 February 2022).
  16. e-Borders (UK). Available online: https://www.nao.org.uk/report/home-office-e-borders-and-successor-programmes/ (accessed on 4 February 2022).
  17. The Schengen Information System. Available online: https://ec.europa.eu/home-affairs/policies/schengen-borders-and-visa/schengen-information-system_en (accessed on 4 February 2022).
  18. European Asylum Dactyloscopy Database (Eurodac). Available online: https://data.europa.eu/data/datasets/eurodac-statistics?locale=en (accessed on 4 February 2022).
  19. The Visa Information System (VIS). Available online: https://ec.europa.eu/home-affairs/policies/schengen-borders-and-visa/visa-information-system_en (accessed on 4 February 2022).
  20. Brouwer, E. Digital Borders and Real Rights: Effective Remedies for Third-Country Nationals in the Schengen Information System; Martinus Nijhoff: Boston, MA, USA, 2008. [Google Scholar]
  21. Reims, N.; Schoen, T.; Boehnel, M.; Sukowski, F.; Firsching, M. Strategies for efficient scanning and reconstruction methods on very large objects with high-energy X-ray computed tomography. Dev. X-ray Tomogr. IX 2014, 9212, 921209. [Google Scholar] [CrossRef]
  22. Chen, G.; Bjorkholm, P.; Fox, T.R.; Wilson, Z.; Bonsergent, X.; McDaniel, F.D.; Doyle, B.L. X-ray Cargo Inspection: Status and Trends. AIP Conf. Proc. 2009, 1099, 570–573. [Google Scholar] [CrossRef]
  23. Macdonald, R.D.R. Design and implementation of a dual-energy X-ray imaging system for organic material detection in an airport security application. In Proceedings of the SPIE 4301, Machine Vision Applications in Industrial Inspection IX, San Jose, CA, USA, 20–26 January 2001; Volume 4301, pp. 31–41. [Google Scholar] [CrossRef]
  24. Wells, K.; Bradley, D.A. A review of X-ray explosives detection techniques for checked baggage. Appl. Radiat. Isot. 2012, 70, 1729–1746. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Martz, H.E.; Crawford, C.R. Explosive detection in aviation applications using CT. In Proceedings of the 11th International Meeting on Fully Three-Dimensional Image Reconstruction in Radiology and Nuclear Medicine, Potsdam, Germany, 11–15 July 2011. [Google Scholar]
  26. Knoll, G.F. Radiation Detection & Measurement; Wiley: New York, NY, USA, 2000. [Google Scholar]
  27. Anderson, N.G.; Butler, A.P.; Scott, N.J.; Cook, N.J.; Butzer, J.S.; Schleich, N.; Firsching, M.; Grasset, R.; Ruiter, N.; Campbell, M.; et al. Spectroscopic (multi-energy) CT distinguishes iodine and barium contrast material in MICE. Eur. Radiol. 2010, 20, 2126–2134. [Google Scholar] [CrossRef] [PubMed]
  28. Boll, D.T.; Patil, N.A.; Paulson, E.K.; Merkle, E.M.; Nelson, R.C.; Schindera, S.T.; Roessl, E.; Martens, G.; Proksa, R.; Fleiter, T.R.; et al. Focal cystic high-attenuation lesions: Characterization in renal phantom by using photon-counting spectral CT-improved differentiation of lesion composition. Radiology 2009, 254, 270–276. [Google Scholar] [CrossRef]
  29. Roessl, E.; Proksa, R. K-edge imaging in X-ray computed tomography using multi-bin photon counting detectors. Phys. Med. Biol. 2007, 52, 4679–4696. [Google Scholar] [CrossRef]
  30. Harding, G.; Kosanetzky, J. Scattered X-ray beam nondestructive testing. Nucl. Instrum. Methods Phys. Res. 1989, A280, 517–528. [Google Scholar] [CrossRef]
  31. Harding, G.; Jordan, B.; Kosanetzky, J. A new fluorescent X-ray source for photon scattering investigations. Phys. Med. Biol. 1991, 36, 1573–1583. [Google Scholar] [CrossRef]
  32. Harding, G.; Harding, A. X-ray diffraction imaging for explosives detection. In Counterterrorist Detection Techniques of Explosives; Yinon, J., Ed.; Elsevier: Amsterdam, The Netherlands; London, UK, 2007; pp. 199–236. [Google Scholar]
  33. Gil, Y.; Oh, Y.; Cho, M.; Namkung, W. Radiography simulation on single-shot dual-spectrum X-ray for cargo inspection system. Appl. Radiat. Isot. 2011, 69, 389–393. [Google Scholar] [CrossRef] [PubMed]
  34. Stevenson, J.; Gozani, T.; Elsalim, M.; Condron, C.; Brown, C. Linac based photofission inspection system employing novel detection concepts. Nucl. Instrum. Methods Phys. Research. Sect. A Accel. Spectrometers Detect. Assoc. Equip. 2011, 652, 124–128. [Google Scholar] [CrossRef]
  35. Duan, X.; Cheng, J.; Zhang, L.; Xing, Y.; Chen, Z.; Zhao, Z. X-ray cargo container inspection system with few-view projection imaging. Nucl. Instrum. Methods Phys. Research. Sect. A Accel. Spectrometers Detect. Assoc. Equip. 2009, 598, 439–444. [Google Scholar] [CrossRef]
  36. Han, Y.P.; Han, Y.; Wang, L.M.; Pan, J.X. Development of X-ray digital radiography automatic inspection system for testing the interior structure of complex product. Binggong Xuebao/Acta Armamentarii 2012, 3, 881–885. [Google Scholar]
  37. Malyshev, V.P.; Sidorov, A.V.; Klinovskiy, P.O.; Smekalkin, V.S.; Efremov, D.V. The IDK-6/9MeV linear electron accelerator and its application in the customs inspection system. In Proceedings of the 23rd Russian Particle Accelerator Conference, Saint Petersburg, Russia, 27–28 September 2012; pp. 549–550. [Google Scholar]
  38. Miller, E.A.; Caggiano, J.A.; Runkle, R.C.; White, T.A.; Bevill, A.M. Scatter in cargo radiography. Appl. Radiat. Isot. 2011, 69, 594–603. [Google Scholar] [CrossRef]
  39. Pourghassem, H.; Fesharaki, N.; Tahmasebi, A. Material detection based on GMM-based power density function estimation and fused image in dual-energy X-ray images. In Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, CICN, Mathura, India, 3–5 November 2012; Volume 6375134, pp. 364–368. [Google Scholar]
  40. Franzel, T.; Shmidt, U.; Roth, S. Object detection in multi-view X-ray images. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7476 LNCS, pp. 144–154. [Google Scholar]
  41. Frosio, I.; Borghese, N.A.; Lissandrello, F.; Venturino, G.; Rotondo, G. Optimized acquisition geometry for X-ray inspection. In Proceedings of the Conference Record–IEEE Instrumentation and Measurement Technology Conference, Hangzhou, China, 10–12 May 2011; Volume 5944195, pp. 300–305. [Google Scholar]
  42. Alan, A. Patent application. In Cargo Inspection System; Rapiscan Systems, Inc.: Torrance, CA, USA, 2015. [Google Scholar]
  43. Joseph, B. Patent application. In Mobile Aircraft Inspection System; Rapiscan Systems, Inc.: Torrance, CA, USA, 2014. [Google Scholar]
  44. Joseph, B.; Mathew, B.C.; Tsahi, G. Langeveld Willem Gerhardus Johannes, Stevenson John David Patent application. In A High-Energy X-ray Spectroscopy-Based Inspection System and Methods to Determine the Atomic Number of Materials; Rapiscan Systems Inc.: Torrance, CA, USA, 2013. [Google Scholar]
  45. Liang, C.X.; Li, C.; Chun, H.M.; Rui, Y.L.; Wen, D.M.; Wu, K.W.; Yang, X.Y.; Kai, X.; Qing, L.Y.; Qing, L.G.; et al. Patent application. In Dual-Energy X-ray Body Scanning Device and Image Processing Method; First Res Inst of Ministry of Public Security of p r c.; Beijing Zhongdun Anmin Analysis Technology Co., Ltd.; European Patent Office: Munich, Germany, 2012. [Google Scholar]
  46. Toshiyasu, S.; Tadashi, M.; Toshihide, S.; Junichi, S.; Shinji, T. Patent application. In Radiation Detection Device, Radiation Image Acquisition System, Radiation Inspection System, and Radiation Detection Method; Hamamatsu Photonics KK; United States Patent: Alexandria, VA, USA, 2011. [Google Scholar]
  47. Katz Jonathan, I.; Morris Christopher, L. Patent application. In X-ray Radiography for Container Inspection; The United States of America as Represented by the United States Department of Energy; United States Patent: Alexandria, VA, USA, 2011. [Google Scholar]
  48. Satpal, S.; Satpal, S. Patent application. In Multiview X-ray Inspection System; United States Patent: Alexandria, VA, USA, 2011. [Google Scholar]
  49. Uwe, S. Patent application. In Method for Improving the Ability to Recognize Materials in an X-ray Inspection System, and X-ray Inspection System; Smiths Heimann GmbH: Wiesbaden, Germany, 2010. [Google Scholar]
  50. Tsutomu, Y.; Shuichiro, Y.; Masashi, Y. Patent application. In X-ray Inspection Apparatus and X-ray Inspection Method; JOB CORPORATION; United States Patent: Alexandra, VA, USA, 2020. [Google Scholar]
  51. Mitchell, T. Machine Learning; McGraw Hill: New York, NY, USA, 1997; ISBN 0-07-042807-7. [Google Scholar]
  52. Vinuesa, R.; Azizpour, H.; Leite, I.; Balaam, M.; Dignum, V.; Domisch, S.; Felländer, A.; Langhans, S.D.; Tegmark, M.; Nerini, F.F. The role of artificial intelligence in achieving the Sustainable Development Goals. Nat. Commun. 2020, 11, 233. [Google Scholar] [CrossRef] [Green Version]
  53. El Naqa, I.; Li, J.; Murphy, M.J. What Is Machine Learning? Machine Learning in Radiation Oncology: Theory and Applications; Springer: Cham, Germany, 2015; pp. 3–11. [Google Scholar] [CrossRef]
  54. Pérez, J.M.; Le Clainche, S.; Vega, J.M. Reconstruction of three-dimensional flow fields from two-dimensional data. J. Comput. Phys. 2020, 407, 109239. [Google Scholar] [CrossRef]
  55. Bell, E.; Mendez, C.; Le Clainche, S.; Vega, J.M. A reduced order model to create two-dimensional flow fields from uni-dimensional data. In AIAA Scitech 2019 Forum; American Institute of Aeronautics and Astronautics: San Diego, CA, USA, 2019. [Google Scholar] [CrossRef]
  56. Le Clainche, S. An Introduction to Some Methods for Soft Computing in Fluid Dynamics. In 14th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2019). SOCO 2019; Martínez Álvarez, F., Troncoso Lora, A., Sáez Muñoz, J., Quintián, H., Corchado, E., Eds.; Advances in Intelligent Systems and Computing; Springer: Cham, Germany, 2020; Volume 950. [Google Scholar] [CrossRef]
  57. Vega, J.M.; Le Clainche, S.L. Higher Order Dynamic Mode Decomposition and Its Applications; Elsevier: Amsterdam, The Netherlands, 2020; ISBN 9780128197431. [Google Scholar]
  58. Abadía-Heredia, R.; López-Martín, M.; Carro, B.; Arribas, J.I.; Pérez, J.M.; Le Clainche, S. A predictive hybrid reduced order model based on proper orthogonal decomposition combined with deep learning architectures. Expert Syst. Appl. 2022, 187, 115910. [Google Scholar] [CrossRef]
  59. Eivazi, H.; Le Clainche, S.; Hoyas, S.; Viuesa, R. Towards extraction of orthogonal and parsimonious non-linear modes from turbulent flows. arXiv 2021, arXiv:2109.01514. [Google Scholar]
  60. Bishop, C.M. Neural Networks for Pattern Recognition; Oxford University Press: New York, NY, USA, 1995. [Google Scholar]
  61. Bishop, C.M. Pattern Recognition and Machine Learning; Springer: New York, NY, USA, 2013. [Google Scholar]
  62. Zurada, J.M. Introduction to Artificial Neural Systems; West Publishing House: St. Paul, MN, USA, 1992. [Google Scholar]
  63. Thazin, Y.; Pobkrut, T.; Kerdcharoen, T. Prediction of acidity levels of fresh roasted coffees using e-nose and artificial neural network. In Proceedings of the 10th International Conference on Knowledge and Smart Technology, Chiang Mai, Thailand, 31 January–3 February 2018; pp. 210–215. [Google Scholar] [CrossRef]
  64. Zhang, L.; Tian, F.C. Performance study of multilayer perceptrons in a low-cost electronic nose. IEEE Trans. Instrum. Meas. 2014, 63, 1670–1679. [Google Scholar] [CrossRef]
  65. Wang, L.P. Support Vector Machines: Theory and Applications; Springer: Berlin, Germany, 2005. [Google Scholar]
  66. Laref, R.; Losson, E.; Sava, A.; Adjallah, K.; Siadat, M. A comparison between SVM and PLS for E-nose based gas concentration monitoring. In Proceedings of the IEEE International Conference on Industrial Technology, Lyon, France, 20–22 February 2018; pp. 1335–1339. [Google Scholar] [CrossRef]
  67. Duda, R.O.; Hart, P.E.; Stork, D.G. Pattern Classification, 2nd ed.; John Wiley and Sons: New York, NY, USA, 2000. [Google Scholar]
  68. Jolliffe, I. Principal Component Analysis. International Encyclopedia of Statistical Science; Lovric, M., Ed.; Springer: Berlin, Germany, 2011. [Google Scholar] [CrossRef]
  69. Baskar, C.; Nesakumar, N.; Rayappan, J.B.B.; Doraipandian, M. A framework for analysing E-nose data based on fuzzy set multiple linear regression: Paddy quality assessment. Sens. Actuators A Phys. 2017, 267, 200–209. [Google Scholar] [CrossRef]
  70. Amemiya, T. Advanced Econometrics; Harvard University Press: Cambridge, MA, USA, 1985. [Google Scholar]
  71. McLachlan, G.J. Discriminant Analysis and Statistical Pattern Recognition; Wiley: New York, NY, USA, 2005. [Google Scholar]
  72. Theodoridis, S.; Koutroumbas, K. Pattern Recognition, 4th ed.; Academic Press Inc.: Orlando, FL, USA, 2009. [Google Scholar]
  73. Tian, X.J.; Wang, J.; Cui, S.Q. Analysis of pork adulteration in minced mutton using electronic nose of metal oxide sensors. J. Food Eng. 2013, 119, 744–749. [Google Scholar] [CrossRef]
  74. Burges, C.J.C. A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 1998, 2, 121–167. [Google Scholar] [CrossRef]
  75. Goudjil, M.; Koudil, M.; Bedda, M.; Ghoggali, N. A novel active learning method using SVM for text classification. Int. J. Autom. Comput. 2018, 15, 290–298. [Google Scholar] [CrossRef]
  76. Barghout, L. Spatial-Taxon Information Granules as Used in Iterative Fuzzy-Decision-Making for Image Segmentation. In Granular Computing and Decision-Making; Springer International Publishing: Berlin/Heidelberg, Germany, 2015; pp. 285–318. [Google Scholar]
  77. Wei, Z.B.; Xiao, X.Z.; Wang, J.; Wang, H. Identification of the rice wines with different marked ages by electronic nose coupled with smartphone and cloud storage platform. Sensors 2017, 17, 2500. [Google Scholar] [CrossRef] [Green Version]
  78. Saha, P.; Ghorai, S.; Tudu, B.; Bandyopadhyay, R.; Bhattacharyya, N. Multi-class support vector machine for quality estimation of black tea using electronic nose. In Proceedings of the 6th International Conference on Sensing Technology, Kolkata, India, 18–21 December 2012; pp. 571–576. [Google Scholar] [CrossRef]
  79. Chang, Z.Y.; Lv, J.H.; Qi, H.Y.; Ma, Y.H.; Chen, D.H.; Xie, J.; Sun, Y.H. Bacterial infection potato tuber soft rot disease detection based on electronic nose. Open Life Sci. 2017, 12, 379–385. [Google Scholar] [CrossRef]
  80. Leal, R.V.; Quiming, A.X.C.; Villaverde, J.F.; Yumang, A.N.; Linsangan, N.B.; Caya, M.V.C. Determination of schizophrenia using electronic nose via support vector machine. In Proceedings of the 9th International Conference on Biomedical Engineering and Technology, Tokyo, Japan, 28–30 March 2019; pp. 13–17. [Google Scholar] [CrossRef]
  81. Zell, A. Chapter 5.2. In Simulation Neuronaler Netze [Simulation of Neural Networks] (German), 1st ed.; Addison-Wesley: Boston, MA, USA, 1994; ISBN 3-89319-554-8. [Google Scholar]
  82. Jain, A.K.; Mao, J.C.; Mohiuddin, K.M. Artificial neural networks: A tutorial. Computer 1996, 29, 31–44. [Google Scholar] [CrossRef] [Green Version]
  83. Thakral, B.; Gupta, S. Artificial neural networks for e-NOSE: A review. Int. J. Appl. Eng. Res. 2012, 7, 1601–1604. [Google Scholar]
  84. Srinivasan, P.A.; Guastoni, L.; Azizpour, H.; Schlatter, P.; Vinuesa, R. Predictions of turbulent shear flows using deep neural networks. Phys. Rev. Fluids 2019, 4, 054603. [Google Scholar] [CrossRef] [Green Version]
  85. Khan, S.; Rahmani, H.; Shah SA, A.; Bennamoun, M.; Medioni, G.; Dickinson, S. A Guide to Convolutional Neural Networks for Computer Vision; Morgan & Claypool Publishers: San Rafael, CA, USA, 2018; Volume 8, pp. 1–207. [Google Scholar] [CrossRef]
  86. Hubel, D.H.; Wiesel, T.N. Receptive fields, binocular interaction and functional architecture in the cat′s visual cortex. J. Physiol. 1962, 160, 106–154. [Google Scholar] [CrossRef]
  87. Guastoni, L.; Güemes, A.; Ianiro, A.; Discetti, S.; Schlatter, P.; Azizpour, H.; Vinuesa, R. Convolutional-network models to predict wall-bounded turbulence from wall quantities. J. Fluid Mech. 2021, 928, A27. [Google Scholar] [CrossRef]
  88. LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef] [PubMed]
  89. Güemes, A.; Discetti, S.; Ianiro, A.; Sirmacek, B.; Azizpour, H.; Vinuesa, R. From coarse wall measurements to turbulent velocity fields through deep learning. Phys. Fluids 2021, 33, 075121. [Google Scholar] [CrossRef]
  90. Buda, T.S.; Caglayan, B.; Assem, H. DeepAD: A generic framework based on deep learning for time series anomaly detection. In Proceedings of the 22nd Pacific-Asia Conference Advances in Knowledge Discovery and Data Mining, Melbourne, Australia, 3–6 June 2018; Springer: Melbourne, Australia, 2018; pp. 577–588. [Google Scholar] [CrossRef]
  91. Litjens, G.; Kooi, T.; Bejnordi, B.E.; Setio, A.A.A.; Ciompi, F.; Ghafoorian, M.; van der Laak, J.A.W.M.; van Ginneken, B.; Sánchez, C.I. A survey on deep learning in medical image analysis. Med. Image Anal. 2017, 42, 60–88. [Google Scholar] [CrossRef] [Green Version]
  92. Chen, L.C.; Papandreou, G.; Kokkinos, I.; Murphy, K.P.; Yuille, A.L. DeepLab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected CRFs. IEEE Trans. Pattern Anal. Mach. Intell. 2018, 40, 834–848. [Google Scholar] [CrossRef] [Green Version]
  93. Yao, Z.J.; Bi, J.; Chen, Y.X. Applying deep learning to individual and community health monitoring data: A survey. Int. J. Autom. Comput. 2018, 15, 643–655. [Google Scholar] [CrossRef]
  94. Wu, C.Y.; Karanasou, P.; Gales, M.J.F.; Sim, K.C. Stimulated deep neural network for speech recognition. In Interspeech 2016, International Speech Communication Association, San Francisco, USA; International Speech Communication Association (ISCA): Baixas, France, 2016; pp. 400–404. [Google Scholar] [CrossRef] [Green Version]
  95. Sun, X.D.; Wu, P.C.; Hoi, S.C.H. Face detection using deep learning: An improved faster RCNN approach. Neurocomputing 2018, 299, 42–50. [Google Scholar] [CrossRef] [Green Version]
  96. Ranjan, R.; Sankaranarayanan, S.; Bansal, A.; Bodla, N.; Chen, J.C.; Patel, V.M.; Castillo, C.D.; Chellappa, R. Deep learning for understanding faces: Machines may be just as good, or better, than humans. IEEE Signal Process. Mag. 2018, 35, 66–83. [Google Scholar] [CrossRef]
  97. Lu, Y.Z. A novel face recognition algorithm for distinguishing faces with various angles. Int. J. Autom. Comput. 2008, 5, 193–197. [Google Scholar] [CrossRef]
  98. Tao, J.H.; Huang, J.; Li, Y.; Lian, Z.; Niu, M.Y. Semi-supervised ladder networks for speech emotion recognition. Int. J. Autom. Comput. 2019, 16, 437–448. [Google Scholar] [CrossRef]
  99. Chan, T.H.; Jia, K.; Gao, S.H.; Lu, J.W.; Zeng, Z.N.; Ma, Y. PCANet: A simple deep learning baseline for image classification? IEEE Trans. Image Process. 2015, 24, 5017–5032. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  100. He, K.M.; Zhang, X.Y.; Ren, S.Q.; Sun, J. Deep residual learning for image recognition. In Proceedings of the Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
  101. Zhao, B.; Feng, J.S.; Wu, X.; Yan, S.C. A survey on deep learning-based fine-grained object classification and semantic segmentation. Int. J. Autom. Comput. 2017, 14, 119–135. [Google Scholar] [CrossRef]
  102. Li, A.X.; Zhang, K.X.; Wang, L.W. Zero-shot fine grained classification by deep feature learning with semantics. Int. J. Autom. Comput. 2019, 16, 563–574. [Google Scholar] [CrossRef] [Green Version]
  103. Qi, P.F.; Meng, Q.H.; Zeng, M. A CNN-based simplified data processing method for electronic noses. In Proceedings of the ISOCS/IEEE International Symposium on Olfaction and Electronic Nose, Montreal, QC, Canada, 28–31 May 2017; pp. 1–3. [Google Scholar] [CrossRef]
  104. Peng, P.; Zhao, X.J.; Pan, X.F.; Ye, W.B. Gas classification using deep convolutional neural networks. Sensors 2018, 18, 157. [Google Scholar] [CrossRef] [Green Version]
  105. Wei, G.F.; Li, G.; Zhao, J.; He, A.X. Development of a Le-Net-5 gas identification CNN structure for electronic noses. Sensors 2019, 19, 217. [Google Scholar] [CrossRef] [Green Version]
  106. Arshak, K.; Moore, E.; Lyons, G.M.; Harris, J.; Clifford, S. A review of gas sensors employed in electronic nose applications. Sens. Rev. 2004, 24, 181–198. [Google Scholar] [CrossRef] [Green Version]
  107. Alassi, A.; Benammar, M.; Brett, D. Quartz crystal microbalance electronic interfacing systems: A review. Sensors 2017, 17, 2799. [Google Scholar] [CrossRef] [Green Version]
  108. Yan, Y.; Lu, D.D.; Hao, H.; Hou, H.P.; Zhang, T.; Wu, L.M.; Cai, L.K. Polyaniline-modified quartz crystal microbalance sensor for detection of formic acid gas. Water Air Soil Pollut. 2012, 223, 1275–1280. [Google Scholar] [CrossRef]
  109. Jha, S.K.; Hayashi, K. A quick responding quartz crystal microbalance sensor array based on molecular imprinted polyacrylic acids coating for selective identification of aldehydes in body odor. Talanta 2014, 134, 105–119. [Google Scholar] [CrossRef]
  110. Wasilewski, T.; Szulczynski, B.; Wojciechowski, M.; Kamysz, W.; Gebicki, J. A highly selective biosensor based on peptide directly derived from the HarmOBP7 aldehyde binding site. Sensors 2019, 19, 4284. [Google Scholar] [CrossRef] [Green Version]
  111. Soares, D. The Evolution of Dome Pressure Receptors in Crocodiles. Evol. Nerv. Syst. 2007, 2, 157–162. [Google Scholar] [CrossRef]
  112. Di-Poï, N.; Milinkovitch, M.C. Crocodylians evolved scattered multi-sensory micro-organs. Evodevo 2013, 4, 19. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  113. Kanhere, E.; Wang, N.; Kottapalli, A.G.P.; Asadnia, M.; Subramaniam, V.; Miao, J.; Triantafyllou, M. Crocodile-inspired dome-shaped pressure receptors for passive hydrodynamic sensing. Bioinspir. Biomim. 2016, 11, 056007. [Google Scholar] [CrossRef] [PubMed]
  114. Mares, J.O.; Miller, J.K.; Sharp, N.D.; Moore, D.S.; Adams, D.E.; Groven, L.J.; Rhoads, J.F.; Son, S.F. Thermal and mechanical response of PBX 9501 under contact excitation. J. Appl. Phys. 2013, 113, 084904. [Google Scholar] [CrossRef] [Green Version]
  115. Zrimsek, A.B.; Bykov, S.V.; Asher, S.A. Deep Ultraviolet Standoff Photoacoustic Spectroscopy of Trace Explosives. Appl. Spectrosc. 2019, 73, 601–609. [Google Scholar] [CrossRef]
  116. Bloomfield, M.; Andrews, D.; Loeffen, P.; Tombling, C.; York, T.; Matousek, P. Non-invasive identification of incoming raw pharmaceutical materials using Spatially Offset Raman Spectroscopy. J. Pharm. Biomed. Anal. 2013, 76, 65–69. [Google Scholar] [CrossRef]
  117. Vinuesa, R.; Sirmacek, B. Interpretable deep-learning models to help achieve the Sustainable Development Goals. Nat. Mach. Intell. 2021, 3, 926. [Google Scholar] [CrossRef]
Figure 1. Schematic of a standard projection radiography setup used for non-intrusive inspection of a large-sized item.
Figure 1. Schematic of a standard projection radiography setup used for non-intrusive inspection of a large-sized item.
Sensors 22 02121 g001
Figure 2. The idea of a rectilinear tomographic scanning system aiming to ensure the blur out of projection details.
Figure 2. The idea of a rectilinear tomographic scanning system aiming to ensure the blur out of projection details.
Sensors 22 02121 g002
Figure 3. Schematic representation of a Real-Time Computed Tomography device.
Figure 3. Schematic representation of a Real-Time Computed Tomography device.
Sensors 22 02121 g003
Figure 4. Schematic representation of a combined computed tomography system with a multiple energy X-ray source.
Figure 4. Schematic representation of a combined computed tomography system with a multiple energy X-ray source.
Sensors 22 02121 g004
Figure 5. Schematic representation of a multiple energy X-ray computed tomography system.
Figure 5. Schematic representation of a multiple energy X-ray computed tomography system.
Sensors 22 02121 g005
Figure 6. Schematic of a backscattering geometry situation.
Figure 6. Schematic of a backscattering geometry situation.
Sensors 22 02121 g006
Figure 7. Typical structure of ANNs.
Figure 7. Typical structure of ANNs.
Sensors 22 02121 g007
Figure 8. The typical odor recognition process.
Figure 8. The typical odor recognition process.
Sensors 22 02121 g008
Table 1. Comparison of currently existent X-ray screening methods.
Table 1. Comparison of currently existent X-ray screening methods.
TechniqueShapeDensityStructureSuspicious Substances
Planar radiographypossible, limitations while superpositioningnot possiblenot possiblebased on shape only [24,25]
X-ray computed tomographyclear, absence of superpositionpossible, using multi-energy analysislimitedbased on shape and density analysis [26]
Dual- and multi-energy imagingclear, absence of superpositionpossible, using multi-energy analysislimitedbased on shape and density analysis [27,28,29]
Backscatter techniquesclear, absence of superpositionpossiblepossibledrugs, explosives, ceramic weapons [30,31]
X-ray diffraction imaginingclear, absence of superpositionpossibleorganics, non-organics, liquidswide range of explosives, including crystalline, amorphous, liquid, home-made [32]
Table 2. Comparison of results analysis methods.
Table 2. Comparison of results analysis methods.
MethodProsCons
Principle component analysisRelatively fast due to data dimension reduction Could be applied for probability estimation for multi-dimensional dataLarge computational time for huge datasets processing
SVMEfficient for solving problems in multi-dimensional spaces
Efficient in-memory consumption
Rapid both for binary and multi-class classification
Excellent result for nonlinear data processing
Could be used for tasks with the number of data samples less than the number of dimensions
A relatively large computational time when a huge amount of data are processed
Results significantly depend on noisy data which can lead to overlapping of classification classes
ANNsPossible to apply for data with the incomplete initial knowledge
High fault tolerance
Could be implemented with parallel processing techniques
Fast results after ANN being trained
Efficient with the large datasets
Could be applied both for regression and classification tasks
Hardware-dependent computational time
Hard to find optimal network structure
Overfitting may occur
Deep learningHighly reliable recognition and classification resultsRelatively more complex for training and implementation compared to other methods
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mamchur, D.; Peksa, J.; Le Clainche, S.; Vinuesa, R. Application and Advances in Radiographic and Novel Technologies Used for Non-Intrusive Object Inspection. Sensors 2022, 22, 2121. https://doi.org/10.3390/s22062121

AMA Style

Mamchur D, Peksa J, Le Clainche S, Vinuesa R. Application and Advances in Radiographic and Novel Technologies Used for Non-Intrusive Object Inspection. Sensors. 2022; 22(6):2121. https://doi.org/10.3390/s22062121

Chicago/Turabian Style

Mamchur, Dmytro, Janis Peksa, Soledad Le Clainche, and Ricardo Vinuesa. 2022. "Application and Advances in Radiographic and Novel Technologies Used for Non-Intrusive Object Inspection" Sensors 22, no. 6: 2121. https://doi.org/10.3390/s22062121

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop